Security+
QRadar
Hacking
Potpourri
WIPRO
100

Ports 80 and 443

What is HTTP/HTTPS?

100

The events "Domain Controller failed to validate the credentials of the account" and "An Account Failed to login" belongs to which offense?

What is General Authentication Failure?

100

A person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.

What is a script kiddie?

100

Contents such as IP addresses, file hashes, misspelling, asking for PII, or a sense of urgency in an email are.

What are IoC's?

100

The HR contact for the Plano office

Who is Melissa Blandford?

200

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as

What is Ransomware?

200

What must you input into a reputation checker to check whether a website is malicious or not?

What are IP Addresses or Domains?

200

A computer attack in which malicious code is embedded in a poorly-designed application and then passed to the back-end database. The malicious data then produces database query results or actions that should never have been executed.

What is SQL injection attack?

200

Automation software that James uses for his project.

What is Demisto?

200

Wipro's CEO

Who is Abidali Neemuchwala (Abid)?

300

A lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall is commonly referred to as.

What is a DMZ?

300

Instead of uploading an actual file, what can be uploaded into VirusTotal to check the reputation?

What is a file hash?

300

An attack in which a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

What is a MITM (Man In The Middle) attack?

300

The cloud software that Jeffrey uses

What is Microsoft Azure?

300

The names of our local IMG team (IT Support department)

Who are Sarin and Arturo?

400

A logical partition of an IP network into multiple, smaller network segments.

What is a subnet?

400

If you have observed a "Remote to Local communication" event. Besides the reputation, what other type of communication must you check for?

What is reverse communication?

400

This port allows malicious hackers to remotely log onto the computers of unsuspecting users — across the Internet. It is known technically as "SMB over IP".

What is port 445?

400

Series of action/events that are executed automatically

What is a playbook?

400

Be passionate about client success

Treat each person with respect

Be global and responsible

Unyielding integrity in everything we do

What are the four pillars of the Spirit of Wipro?

500

A type of Policy stipulating rules of behavior to be followed by users of computers, networks, and associated resources is referred to as

What is Acceptable Use Policy?

500

A data source such as firewalls and servers that creates an event and parses information into QRadar.

What are log sources?

500

This type of malware is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Additionally, it is a polymorphic banking Trojan that can evade typical signature-based detection. It has several methods for maintaining persistence, including auto-start registry keys and services. It uses modular Dynamic Link Libraries (DLLs) to continuously evolve and update its capabilities. Furthermore, it is Virtual Machine-aware and can generate false indicators if run in a virtual environment.

What is Emotet?

500

A utility that records the path (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer. It also calculates and displays the amount of time each hop took.

What is a traceroute?

500

W.I.P.R.O stands for

Western India Palm Refined Oil Limited

M
e
n
u